You could use, for example, the ip or ifconfig commands in a terminal: ip addr, or sudo ifconfig. There are a number of different ways to determine your ip address on a Linux distribution such as Kali. We’ll then configure Wireshark and run a packet captures to get a sense for the normal traffic on the network, and then run another capture to analyze just how an nmap network scan works.īefore we can scan the network with nmap, we need to identify the ip address range we would like to examine. We are first going to use nmap to see if we can identify any such devices on the network, and perhaps detect one or two that we did not think or know were connected to it. There may also be more computers or cell phones connected to it, and maybe even your television, refrigerator or coffee maker! At the very least, we know there will be at least three: the Kali guest, the host machine you are running Kali on, and your router. Do you happen to know how many devices are currently connected to your home network? Can you identify all of them off the top of your head? Try to do so, and make a list of them. Dumpcap is a command line network traffic monitor, and Wireshark provides a powerful and versatile graphical interface to monitor network traffic and analyze network packet capture files. Nmap is a command line network scanner, and Zenmap is a graphical interface to nmap. These will come in handy in our eventual testing lab, but they can obviously also be used to explore your home local area network as well. In particular, we’ll take a look at a set of tools that come bundled in Kali that can be used for network analysis: nmap/Zenmap and dumpcap/Wireshark. This article will show how some of the tools that come bundled in Kali can be used to explore your existing home computer network, and test whether you can successfully identify all the devices that are connected to it. But if you’re like me, you’re probably already itching to start playing with all the toys Kali has to offer, if you haven’t already! Finally, your Kali VM has a single network adapter running in bridged mode and you have set up an administrator account on the Kali instance.Ĭreating and configuring the virtual network setup outlined in the introduction, which we will do in part three of this series, requires a few more steps: we still have to download and install Metasploitable, set up the virtual network, etc. The Kali system has been fully updated and VirtualBox Guest Additions have been installed on it. If you followed along in part one, installing a Kali Linux virtual machine in VirtualBox, you have installed VirtualBox on the primary computer for your home lab and created a Kali Linux virtual guest on this host machine. This article is part two in our tutorial series on how to set up a home hacking and security testing lab.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |